21 results (0.011 seconds)

CVSS: 9.3EPSS: 75%CPEs: 13EXPL: 1

12 Aug 2009 — Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability." Desbordamiento de búfer en Office Web Components ActiveX Control en Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server ... • https://www.exploit-db.com/exploits/16542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 65%CPEs: 11EXPL: 0

11 Aug 2009 — The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger "system state" corruption, aka "Office Web Components... • http://www.securitytracker.com/id?1022708 • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 41%CPEs: 3EXPL: 0

15 Jul 2009 — Microsoft Internet Security and Acceleration (ISA) Server 2006 Gold and SP1, when Radius OTP is enabled, uses the HTTP-Basic authentication method, which allows remote attackers to gain the privileges of an arbitrary account, and access published web pages, via vectors involving attempted access to a network resource behind the ISA Server, aka "Radius OTP Bypass Vulnerability." Microsoft Internet Security y Acceleration (ISA) Server 2006 Gold y SP1, cuando Radius OTP está activado, usa el método de autentic... • http://secunia.com/advisories/35784 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 86%CPEs: 11EXPL: 4

15 Jul 2009 — The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourc... • https://www.exploit-db.com/exploits/9163 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.3EPSS: 47%CPEs: 2EXPL: 0

20 Sep 2007 — The SOCKS4 Proxy in Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 and SP2 allows remote attackers to obtain potentially sensitive information (the destination IP address of another user's session) via an empty packet. El proxy SOCKS4 de Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 y SP2 permite a atacantes remotos obtener información potencialmente confidencial (la dirección IP destino de la sesión de otro usuario) mediante un paquete vacío. This vulnerability allo... • http://osvdb.org/45906 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 38%CPEs: 1EXPL: 0

23 Feb 2007 — Microsoft Internet Security and Acceleration (ISA) Server 2004 logs unusual ASCII characters in the Host header, including the tab, which allows remote attackers to manipulate portions of the log file and possibly leverage this for other attacks. Microsoft Internet Security y Acceleration (ISA) Server 2004 guarda en ficheros de log caracteres ASCII no usuales en la cabecera Host, lo cual permite a atacantes remotos manipular partes del fichero de log y posiblemente utilizar esto para otros ataques. • http://www.securityfocus.com/archive/1/432947/30/5190/threaded •

CVSS: 7.5EPSS: 19%CPEs: 1EXPL: 0

17 Jul 2006 — Microsoft Internet Security and Acceleration (ISA) Server 2004 allows remote attackers to bypass file extension filters via a request with a trailing "#" character. NOTE: as of 20060715, this could not be reproduced by third parties. Microsoft Internet Security and Acceleration (ISA) Server 2004 permite a atacantes remotos evitar los filtros de extensiones de ficheros mediante una petición con un carácter "#" al final. NOTA: desde 20060715, esto no ha podido ser reproducido por terceras partes. • http://securitytracker.com/id?1016506 •

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 0

06 Apr 2006 — Microsoft ISA Server 2004 allows remote attackers to bypass certain filtering rules, including ones for (1) ICMP and (2) TCP, via IPv6 packets. NOTE: An established researcher has disputed this issue, saying that "Neither ISA Server 2004 nor Windows 2003 Basic Firewall support IPv6 filtering ... This is different network protocol. • http://www.securityfocus.com/archive/1/429816/100/0/threaded •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

14 Jun 2005 — Microsoft ISA Server 2000 allows remote attackers to poison the ISA cache or bypass content restriction policies via a malformed HTTP request packet containing multiple Content-Length headers. • http://secunia.com/advisories/15693 •

CVSS: 7.5EPSS: 43%CPEs: 1EXPL: 0

14 Jun 2005 — Microsoft ISA Server 2000 allows remote attackers to connect to services utilizing the NetBIOS protocol via a NetBIOS connection with an ISA Server that uses the NetBIOS (all) predefined packet filter. • http://secunia.com/advisories/15693 •